answersLogoWhite

0

How do you create hash of password?

User Avatar

Anonymous

14y ago
Updated: 8/19/2019

I'm not sure i got your question right or not, but if you mean how to encrypt password for saving or ect, use md5 function

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

How do you get a Windows XP password from a password hash?

There are several tools that will determine the password from the hash. You can find them via any Internet search engine.


What is lamport hash?

Lamport's hash implements a one-time password protecting against eavesdropping and password file theft.


What data type is suitable for password field?

We never store passwords in a password field. If we did that, anyone with access to the database would have access to all the passwords. Instead, we store the output from a one-way cryptographic hashing function. That is, when a user creates a password, we store the hash value generated from that password via the hashing function. When the user subsequently enters their password in order to log on, the hash value generated by the entered password is compared with the stored hash value. If the two hash values match exactly then the correct password was entered. Being one-way, it is not possible to determine the password from the hash value, even if we know the precise implementation details of the hash function employed to create the hash value. This is the safest way to store passwords; we simply need to ensure that the same hash function that was used to generate the hash is also used to validate the user's password at logon. Cryptographic hashes can vary in length depending on which function was used to generate the hash value. Typical values are 128-bit, 160-bit, 256-bit and 512-bit, thus a fixed-length binary field of the required length would be suitable for storing the hash values.


If you forget your password can you get it back?

Generally speaking, no. The way secure websites and programs store passwords is in a hash, not plaintext. When you submit your password, the password you give is encrypted and compared to the stored password hash you originally gave. Since the encryption cannot be undone, your original password cannot be provided to you.


What is an example sentence for the word hash?

An example sentence for hash is: One definition of hash is dish of cooked meat cut into small pieces and cooked again, usually with potatoes.


What is algprithm that Linux is used to decode the password?

This really depends on which password you mean. Most user passwords aren't so much decoded as they are hashed through alorithms such as MD5 and the result compared to a stored hash for the password. If the hashes match, Linux concludes the password is correct. Passwords are done this way as checksum hashes can't be reversed. They are assymetrical, meaning running a hash through the same algorithm merely results in another hash, not the password. This is a very secure way to store passwords.


Hash function for storing password in c program?

MD5 and SHA1 are quite common.


How do you get msn password?

You create your password when you create your account.


What hash algorithm is used in NTLM?

NTLM (NT LAN Manager) uses the MD4 hash algorithm for hashing passwords. When a user sets a password, NTLM computes an MD4 hash of the UTF-16LE encoded password. This hash is then stored in the Security Account Manager (SAM) database. However, due to its vulnerabilities, NTLM is considered weak and has largely been replaced by more secure authentication protocols like Kerberos.


What is the password to Answers.com?

you have to create your own password. create an account.


How do you access the superuser password on ubuntu without access privileges like a command prompt or something?

You can't "access" the superuser password. In addition to being stored in a file only readable by the superuser, its also encrypted in a one-way hash. This means that it is not stored in plaintext, and the computer checks to see if the password is correct by encrypting the supplied password and seeing if the hash matches, not just comparing the passwords sirectly.


What is the most commonly used password hash under Linux?

This is impossible to fully answer. Password hashes are "salted" in Linux. This means, among other things, that the stored value for the same password can vary significantly.